Yes, definitely. According to our roadmap, "OpenVPN 3.3 AirVPN" based clients will be deployed for Linux (not only x86 but also ARM), OpenBSD and FreeBSD, three systems which are widely used even in various devices (including routers) using CPUs not supporting AES-NI.

We're very glad to inform you that a new Eddie Air client version has been released: 2.18beta. It is ready for public beta testing.

How to test our experimental release:
Go to download page of your OS
Click on Other versions
Click on Experimental
Look at the changelog if you wish
Download and install
Please see the changelog:
https://eddie.website/changelog/?software=client&format=html

In this release, we changed all source code from the ground up, to separate what needs superuser privileges and what not.

PLEASE CONSIDER THIS A BETA VERSION.
Don't use it for real connection, it's only for those who want to collaborate to the project as beta-tester.
We hope to raise now the frequency of feedback replies here and Eddie releases.

1) Network Lock is not meant to survive a reboot. It's an intended behavior and a very wise decision.

2) Network Lock will remain enforced if Eddie crashes, contrarily to what you claim. It's a set of firewall rules. BUT of course if Eddie crashes at the very start then of course Network Lock will not be set.

3) If you wish that your system is always isolated from the Internet during bootstrap, set a permanent firewall rule (or two, if you have IPv6) blocking all outbound traffic. That's all, because when Network Lock is activated, Eddie will rewrite rules to allow communications to Air VPN servers. Similarly, when Network Lock is disabled by your command, Eddie will restore your previous firewall rules, which will block again all traffic (so you don't need to worry not even during the shutdown).

We're very glad to inform you that a new Eddie Air client version has been released: 2.18beta. It is ready for public beta testing.

How to test our experimental release:
Go to download page of your OS
Click on Other versions
Click on Experimental
Look at the changelog if you wish
Download and install
Please see the changelog:
https://eddie.website/changelog/?software=client&format=html

In this release, we changed all source code from the ground up, to separate what needs superuser privileges and what not.

PLEASE CONSIDER THIS A BETA VERSION.
Don't use it for real connection, it's only for those who want to collaborate to the project as beta-tester.
We hope to raise now the frequency of feedback replies here and Eddie releases.

AirVPN is very proud to introduce for the first time ever OpenVPN 3 support for ChaCha20-Poly1305 cipher with Eddie Android edition 2.4.

The new implementation means remarkably higher performance and longer battery life for your Android device.

CPUs that do not support AES New Instructions, typically ARM CPUs mounted on most Android devices, are much faster to encrypt and decrypt a stream of data with ChaCha20 than AES. At the same time, ChaCha20 offers the same security when compared to AES.https://en.wikipedia.org/wiki/Salsa20#ChaCha_variant

You can test right now the new cipher. We have prepared four test servers running OpenVPN 2.5 and supporting ChaCha20 in Canada and the Netherlands. When you pick ChaCha20 as cipher in Settings, Eddie will filter properly Air VPN servers to let you connect to them.

The outstanding feature has been made possible by AirVPN implementation on "OpenVPN AirVPN" of new directives, never supported before by OpenVPN 3, as well as a brand new, rationally re-engineered class for AEAD ciphers, which currently includes both AES-GCM and ChaCha20. Development of OpenVPN 3 will go on during the next months. Here's the current status:

Eddie for Android is free and open source software released under GPLv3. We invite you to check from independent 3rd parties lack of trackers code signatures, for example here: https://reports.exodus-privacy.eu.org/en/reports/search/org.airvpn.eddie

You can also download it from the Google Play Store:https://play.google.com/store/apps/details?id=org.airvpn.eddie

and in Amazon Appstore:https://www.amazon.com/Eddie-AirVPN-official-OpenVPN-GUI/dp/B07KTD6DH9/ref=sr_1_1?keywords=eddie+airvpn

Source code is available in GitLab:https://gitlab.com/AirVPN/EddieAndroid/

How to enable ChaCha20 on the Data Channel

Open "Settings" view, then open "AirVPN". Locate "Encryption Algorithm", tap it and set "CHACHA20-POLY1305", then tap "OK".

New in version 2.4:

Updated native library to OpenVPN 3.3 AirVPN
ChaCha20-Poly1305 support on both OpenVPN Control and Data channels
Support by OpenVPN 3 AirVPN of ncp-disable directive integrated in the app according to the cipher suite picked by the user
For new features complete list, please see the changelog at the bottom of this post
Main features:
Free and open source OpenVPN GUI based on "OpenVPN 3.3 AirVPN"
Complete ChaCha20, AES-GCM and AES-CBC support
The only Android application officially developed by AirVPN
Robust, best effort prevention of traffic leaks outside the VPN tunnel
Battery-conscious application
Low RAM footprint
Ergonomic and friendly interface
Ability to start and connect the application at device boot
Option to define which apps must have traffic inside or outside the VPN tunnel through white and black list
Localization in simplified and traditional Chinese, Danish, English, French, German, Italian, Portuguese, Russian, Spanish, Turkish
Full integration with AirVPN
Enhanced security thanks to locally stored encrypted data through master password
Quick one-tap connection and smart, fully automated server selection
Smart server selection with custom settings
Manual server selection
Smart attempts to bypass OpenVPN blocks featuring protocol and server fail-over
Full Android TV compatibility including D-Pad support. Mouse emulation is not required.
Enhancements aimed to increase accessibility and comfort to visually impaired persons
AirVPN servers sorting options
Customizable "Favorite" and "Forbidden" servers and countries
OpenVPN mimetype support to import profiles from external applications
Multiple OpenVPN profile support. The app now imports and manages multiple OpenVPN profiles
Support for custom bootstrap servers
Support for favorite and forbidden countries
AirVPN broadcast messages support
User's subscription expiration date is shown in login/connection information
The app is aware of concurrent VPN use. In case another app is granted VPN access, Eddie acts accordingly and releases VPN resources
Optional local networks access. In such case, local network devices are exempted from the VPN and can be accessed within the local devices
Localization override. User can choose the default language and localization from one of the available ones
Favorite and forbidden lists can be emptied with a single tap
VPN Lock can now be disabled or enabled from settings
VPN reconnection in case of unexpected OpenVPN disconnection. (It requires VPN Lock to be disabled)
User can generate an OpenVPN profile for any AirVPN server or country and save it in OpenVPN profile manager
Server scoring algorithm implementing the latest AirVPN balancing factors in order to determine the best server for quick connection
Network name and extra information are shown along with network type
Device network status management
Kind regards & datalove
AirVPN Staff

ConnectAirVPNServerFragment.java
[ProMIND] Show a warning in yellow in case server has a warning_open status
[ProMIND] Servers are now filtered according to selected encryption
[ProMIND] searchDialog(): soft keyboard is shown by default
ConnectionInfoFragment.java
[ProMIND] Added cipher name and digest to info box

Unfortunately, our OpenVPN 3 library, and/or an app based on it, is not planned for iOS currently, as GPL and similar licenses remain incompatible with the Apple store terms. Obviously we can not legally close the source code or provide a binary without source code or modify the license of the source code our apps are based on (not even if we wanted, and we don't), so we can't do anything for iOS in this case.

The issue has been brought into light by FSF itself in 2010: https://www.fsf.org/blogs/licensing/more-about-the-app-store-gpl-enforcement
and raised a lot of attention again when Apple took down VLC from the store.

It is periodically debated, for example here: https://news.ycombinator.com/item?id=12827624

That's also the reason for which openvpn-connect is the only app to use OpenVPN in iOS devices from the Apple Store (as the conditions enforced by OpenVPN Technologies to the commits by anyone is that they can change the license, close the code, redistribute it for their commercial purposes etc).

Now and then this eccentric idea comes out. Frankly we can't see any rational reason to understand how from an amount of connections per user which can be stored into single integer variable one should jump to the idea of logging.

We operate servers of our property as well as rented servers. That's another bizarre idea, which you use to jump to conclusions. Anyway if you think that a datacenter logs the traffic metadata and/or content of any and each communication to/from the devices using their lines, what is the difference between an owned and a rent server? By the way just apply partition of trust, end of the story.

This will be fixed for sure. We will not repeat the same mistake, trust us.

Stop, you misunderstood the whole matter: the patch fixed the corruption of the configuration file which was caused by the bootstrap servers output. It was not something to be fixed in the code of Eddie desktop editions, apart of course designing a software which handles in a better way corrupt configuration files.

The bootstrap servers were reconfigured with a new manifest format which introduced a bug: when someone tried to log the account in without having a valid plan, the bootstrap servers returned a bad message format that caused the corruption of the default.xml file of the user who did not have a valid plan.

The bug was fixed quickly in the bootstrap servers. The patch you mention fixes corrupt configuration files on the client side, as an alternative to delete them. Not essential, just an additional tool for those Windows users who tried to access the service without a valid plan.

Yes, you had better stop speculating. Clodo is an Air co-founder so your assumption is wrong.

We will let Clodo explain the exact reasons of such delays in development, if he wishes so. Here we just point out that any excessive work load on some department is being quickly balanced to avoid any further problem of this kind. AirVPN has both the resources and the will to continue delivering the best VPN experience in the consumers' market as it has always done in the last 8 years.

About the last year you mention, you can note that AirVPN has delivered from scratch not only an Android application with unrivaled features, but it is the only VPN which actively develops OpenVPN 3. AirVPN has added to OpenVPN 3 missing features that were never seen in it after years and years of development, like ChaCha20 cipher on the Data Channel. No other VPN service has ever achieved the same results.

This will be fixed for sure. We will not repeat the same mistake, trust us.

Stop, you misunderstood the whole matter: the patch fixed the corruption of the configuration file which was caused by the bootstrap servers output. It was not something to be fixed in the code of Eddie desktop editions, apart of course designing a software which handles in a better way corrupt configuration files.

The bootstrap servers were reconfigured with a new manifest format which introduced a bug: when someone tried to log the account in without having a valid plan, the bootstrap servers returned a bad message format that caused the corruption of the default.xml file of the user who did not have a valid plan.

The bug was fixed quickly in the bootstrap servers. The patch you mention fixes corrupt configuration files on the client side, as an alternative to delete them. Not essential, just an additional tool for those Windows users who tried to access the service without a valid plan.

Yes, you had better stop speculating. Clodo is an Air co-founder so your assumption is wrong.

We will let Clodo explain the exact reasons of such delays in development, if he wishes so. Here we just point out that any excessive work load on some department is being quickly balanced to avoid any further problem of this kind. AirVPN has both the resources and the will to continue delivering the best VPN experience in the consumers' market as it has always done in the last 8 years.

About the last year you mention, you can note that AirVPN has delivered from scratch not only an Android application with unrivaled features, but it is the only VPN which actively develops OpenVPN 3. AirVPN has added to OpenVPN 3 missing features that were never seen in it after years and years of development, like ChaCha20 cipher on the Data Channel. No other VPN service has ever achieved the same results.

AsusWRT is a unified firmware developed by Asus for use in their recent routers.The firmware was originally based on Tomato-RT/Tomato-USB, but has since seen many changes.Asus started using this new firmware with their recent routers (RT-AC68U, RT-AC87U), but they also started moving other routers to this new firmware.

Prerequisite

Asus Router with AsusWRT (native OpenVPN support).Model tested:RT-AC68U but it should work for all Asus routers that have AsusWRT.see Official website for AsusWRT model support list.

[Firmware Notes]: Please upgrade the router Firmware to the latest version."New Asus Firmware supports 4096 bits key and will work with AirVPN."

Steps1. Create configuration files from our Config Generator. Select [Router or others] and choose a server you like. Tick on [Direct, protocol UDP, port 443] and click on [Generate]. Save the openvpn config file .ovpn (Ex: AirVPN__UDP-443.ovpn) anywhere on your computer. 2. Open the Asus router webinterface and click on [VPN]. Click on [Add profile], choose [OpenVPN] tab. Enter a "description", leave username and password EMPTY. Click on [browse] and select the downloaded openvpn config file (.ovpn). Click on [upload]. Click on [OK]. That's it now you can click on [Activate] to connect to AirVPN server.

3. Make sure to setup the AirVPN DNS this way: Click on [WAN] tab. Turn [DNS server] "off" (No) and enter AirVPN's DNS 10.4.0.1 as first DNS IP address (it's DNS for Protocol UDP, Port 443 - see Specs for more details).About the secondary DNS entry, we recommend picking ones from the OpenNIC Project.The AirVPN DNS will enable you to access AirVPN geo-routing services to bypass discriminations based on IP address geo-location. 4. Visit https://ipleak.net and check if it works. Every client (PC, Smartphone, Console, Smart TV ..) which is connected to the router now is secured by VPN and also have full access to the anti-geo-blocking service.

Useful Info

A custom firmware for Asus routers based on official AsusWRT called Asuswrt-Merlin is available.

AsusWRT-Merlin retains all the features of the original stock AsusWRT firmware with added/enhanced features.More info on AsusWRT-Merlin website http://asuswrt.lostrealm.ca/features

I have tried importing config files with ipv6 preferred over ipv4 (the advanced option to the right in the config generator), but apparently the NetworkManager "VPN plugin" fails to parse the line with either:

proto udp6
or
proto tcp6
An error message pops up and the file is not imported.
The ovpn configs can only be parsed with proto udp or proto tcp. Clearly the "VPN plugin" for NetworkManager (networkmanager-openvpn 1.8.10) is not working well and only allows ipv4.

Anyway, this is not a problem on AirVPN's side, but I hope this helps somebody else with this issue, and hopefully NetworkManager will get an update regarding this.

This issue is tracked there:https://gitlab.freedesktop.org/NetworkManager/NetworkManager/issues/130 https://gitlab.gnome.org/GNOME/NetworkManager-openvpn/issues/18

Funny marketing fluff. Since AirVPN birth we allow multi-hop connections (opt-in) between different VPN servers, between VPN servers and SOCKS or HTTPS proxies, or (better solution) between VPN servers and Tor nodes. Safer and better than marketing fluff.

HOWEVER, it must be known that there are some errors in the article you linked. It mixes at least two totally different attack types and makes a lot of confusion. Timing attacks can be performed anyway even on Tor network (in any low latency mix based protocol network, in general) given an adversary with enough power to monitor vast portions of the Internet., so the general analysis provided by the article is... imaginative, to say the least.

The datacenter operations might be impaired by the charges against the datacenter management issued on last June and related to crimes allegedly committed in 2012:https://www.cp24.com/news/owners-of-toronto-web-hosting-company-charged-in-massive-child-pornography-bust-1.4474497

Although our VPN servers in that datacenter have still IPv4 connectivity, only on some IP addresses, we can't of course count on them reliably. We are therefore shutting them down. Infrastructure in Canada remains with 31 servers capable of 1 Gbit/s bandwidth each, which provide wide redundancy, and we will anyway enlarge it whenever necessary.

Hello,
we have experienced a problem with VPN server LetsEncrypt certificates deployment. The system procedure got stuck and failed to deploy updated certificates. In turn, such a failure caused "route check" failures on Eddie desktop editions, and ONLY on them, due to expired certificates verified by cURL during the route check phase.

The problem has been affecting a wide amount of VPN servers for about 8 hours and has been resolved completely now. We deeply apologize for any inconvenience.

At this stage we can say that the cause of this specific problem was essentially a ban against IP addresses, a ban which extended on all of our infrastructure to defend Air against attacks. To be banned an IP address has to fail several login attempts in a row in a short time.

As the whole matter involved at least 40 persons, probably some more, who did not change IP address in the last days, we can't say how it's possible that their IP addresses were all banned. We are searching for flaws in our anti-flood system. It is the same system that has been working fine with no modifications in the last 18-20 months so if there's some bug it's really well hidden and comes out so rarely. Even if it's a bug, why it did not affect, say 1000, 5000 or 20000 or ALL users, but just a tiny tiny fraction?

While a few cases might be explained by infected machines, when the owner is not even aware that the system performs attacks, we can't realistically assume that all of a sudden the machines of more than 40 users were infected all in the last 2-3 days, and all infected with the same peculiar malware which attacked AirVPN (too or exclusively).

We will keep you posted if we find anything relevant. In the meantime please keep reporting whether everything is fine or the problem comes back.

We're very glad to inform you that a new 1 Gbit/s server located in Singapore (SG) is available: Lacaille.

The AirVPN client will show automatically the new server; if you use any other OpenVPN client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator").